Andrew McAfee. ‘Enterprise 2.0: The Dawn of Emergent Collaboration’. MIT Sloan Management Review, vol. 47, no. 3, 2006, pp. 21–28, http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/224963703/DD44A2F5F66A40ADPQ/6?accountid=14888.
Andriole, Stephen. ‘Business Impact of Web 2.0 Technologies’. Communications of the ACM, vol. 53, no. 12, 2010, https://doi.org/10.1145/1859204.1859225.
Annabi, Hala, and Sean McGann. ‘Social Media as the Missing Link: Connecting Communities of Practice to Business Strategy’. Journal of Organizational Computing and Electronic Commerce, vol. 23, no. 1–2, 2013, pp. 56–83, https://doi.org/10.1080/10919392.2013.748608.
Aral, Sinan, et al. ‘Social Media and Business Transformation: A Framework for Research’. Information Systems Research, vol. 24, no. 1, 2013, pp. 3–13, https://doi.org/10.1287/isre.1120.0470.
Aula, Pekka. ‘Social Media, Reputation Risk and Ambient Publicity Management’. Strategy & Leadership, vol. 38, no. 6, 2010, pp. 43–49, http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/761420153/8B1E132A12504579PQ/6?accountid=14888.
Avgerou, Chrisanthi. ‘The Significance of Context in Information Systems and Organizational Change.’ Information Systems Journal, vol. 11, no. 1, 2001, pp. 43–63, https://doi.org/10.1046/j.1365-2575.2001.00095.x.
Banck, Björn, and Christina Amcoff Nyström. ‘Intranet Use: A Study of Five Swedish Organizations’. Journal of Organisational Transformation & Social Change, vol. 2, no. 2, 2005, pp. 153–80, https://arlir.iii.com/nonret~S0&atitle=Intranet+use:+a+study+of+five+Swedish+organizations&title=Journal+of+Organisational+Transformation+&+Social+Change&aufirst=Bjrn&auinit=&aulast=Banck&issn=14779633&eissn=2040056X&coden=&volume=2&issue=2&spage=153&epage=180&quarter=&ssn=&date=2005&sid=&reqtype3.
Baptista, João, et al. ‘Social Media and the Emergence of Reflexiveness as a New Capability for Open Strategy’. Long Range Planning, Aug. 2016, https://doi.org/10.1016/j.lrp.2016.07.005.
Baptista (John), João, et al. ‘Paradoxical Effects of Institutionalisation on the Strategic Awareness of Technology in Organisations’. The Journal of Strategic Information Systems, vol. 19, no. 3, Sept. 2010, pp. 171–83, https://doi.org/10.1016/j.jsis.2010.07.001.
Beynon-Davies, Paul. Significance: Exploring the Nature of Information, Systems and Technology. Palgrave Macmillan, 2011, http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb2485241.
Birkinshaw, Julian. ‘Reflections on Open Strategy’. Long Range Planning, 2016, https://doi.org/10.1016/j.lrp.2016.11.004.
Bjelland, Osvald MWood, Robert Chapman. ‘An Inside View of IBM’s “Innovation Jam”’. MIT Sloan Management Review, vol. 50, no. 1, 2008, pp. 32–40, http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/224960315/3A84CF4D6DCB441CPQ/10?accountid=14888.
Butler, Tom. ‘An Institutional Perspective on Developing and Implementing Intranet- and Internet-Based Information Systems’. Information Systems Journal, vol. 13, no. 3, 2003, pp. 209–31, https://doi.org/10.1046/j.1365-2575.2003.00151.x.
Chesbrough, Henry, and Melissa Appleyard. ‘Open Innovation and Strategy.’ California Management Review, vol. 50, no. 1, 2007, pp. 57–76, http://0-search.ebscohost.com.pugwash.lib.warwick.ac.uk/login.aspx?direct=true&db=bth&AN=27340265&site=bsi-live.
Clarke, Ken, and David Preece. ‘Constructing and Using a Company Intranet: “It’s a Very Cultural Thing”’. New Technology, Work and Employment, vol. 20, no. 2, 2005, pp. 150–65, https://doi.org/10.1111/j.1468-005X.2005.00150.x.
Coakes, ElayneBradburn, Anton. ‘What Is the Value of Intellectual Capital?’ Knowledge Management Research & Practice, vol. 3, no. 2, pp. 60–68, http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/203469989/17353D92383D456BPQ/3?accountid=14888.
Corporate Intranet Implementation: Managing Emergent Technologies and Organizational Practices. https://www.researchgate.net/publication/220580381_Corporate_Intranet_Implementation_Managing_Emergent_Technologies_and_Organizational_Practices.
Curry, Adrienne, and Lara Stancich. ‘The Intranet — an Intrinsic Component of Strategic Information Management?’ International Journal of Information Management, vol. 20, no. 4, Aug. 2000, pp. 249–68, https://doi.org/10.1016/S0268-4012(00)00015-3.
Damsgaard, Jan, and Rens Scheepers. ‘Managing the Crises in Intranet Implementation: A Stage Model’. Information Systems Journal, vol. 10, no. 2, 2000, pp. 131–49, https://doi.org/10.1046/j.1365-2575.2000.00076.x.
---. ‘Power, Influence and Intranet Implementation’. Information Technology & People, vol. 12, no. 4, 1999, pp. 333–58, https://doi.org/10.1108/09593849910301630.
David Wagner, Gabriele Vollmar, Heinz-Theo Wagner. ‘The Impact of Information Technology on Knowledge Creation: An Affordance Approach to Social Media’. Journal of Enterprise Information Management, vol. 27, no. 1, 2014, pp. 31–44, http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/1490992058/17BA4981E48D4E77PQ/2?accountid=14888.
Davison, Robert, and Carol Ou. ‘Digital Work in a Digitally Challenged Organization’. Information & Management, vol. 54, no. 1, 2017, pp. 129–37, https://doi.org/10.1016/j.im.2016.05.005.
Denyer, David, et al. ‘"Social”, "Open” and "Participative”? Exploring Personal Experiences and Organisational Effects of Enterprise2.0 Use’. Long Range Planning, vol. 44, no. 5–6, 2011, pp. 375–96, https://doi.org/10.1016/j.lrp.2011.09.007.
Dhillon, Gurpreet, and James Backhouse. ‘Current Directions in IS Security Research: Towards Socio-Organizational Perspectives.’ Information Systems Journal, vol. 11, no. 2, 2001, pp. 127–53, https://doi.org/10.1046/j.1365-2575.2001.00099.x.
Dixon, Keith R., and Niki Panteli. ‘From Virtual Teams to Virtuality in Teams’. Human Relations, vol. 63, no. 8, 2010, pp. 1177–97, https://doi.org/10.1177/0018726709354784.
Doherty, Neil, et al. ‘The Information Security Policy Unpacked: A Critical Study of the Content of University Policies’. International Journal of Information Management, vol. 29, no. 6, 2009, pp. 449–57, https://doi.org/10.1016/j.ijinfomgt.2009.05.003.
Doherty, Neil, and Heather Fulford. ‘Aligning the Information Security Policy with the Strategic Information Systems Plan’. Computers & Security, vol. 25, no. 1, Feb. 2006, pp. 55–63, https://doi.org/10.1016/j.cose.2005.09.009.
Drucker, Peter F. ‘The Coming of the New Organization’. Harvard Business Review, vol. 66, no. 1, 1988, pp. 45–53, http://0-search.ebscohost.com.pugwash.lib.warwick.ac.uk/direct.asp?db=bth&jid=HBR&scope=site.
Duane, Aidan, and Pat Finnegan. ‘Managing Empowerment and Control in an Intranet Environment’. Information Systems Journal, vol. 13, no. 2, 2003, pp. 133–58, https://doi.org/10.1046/j.1365-2575.2003.00148.x.
Dubravka  Cecez-Kecmanovic, Debra Moodie, Andy Busuttil, Fiona Plesman. ‘Organisational Change Mediated by E-Mail and Intranet An Ethnographic Study’. Information Technology & People, vol. 12, no. 1, 1999, pp. 9–26, http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/222356590/452338D38B514D41PQ/1?accountid=14888.
Faraj, Samer, et al. ‘Knowledge Collaboration in Online Communities’. Organization Science, vol. 22, no. 5, 2011, pp. 1224–39, https://doi.org/10.1287/orsc.1100.0614.
Fayard, A. L., and J. Weeks. ‘Photocopiers and Water-Coolers: The Affordances of Informal Interaction’. Organization Studies, vol. 28, no. 5, 2007, pp. 605–34, https://doi.org/10.1177/0170840606068310.
Flecker, Jörg, editor. Space, Place and Global Digital Work. Palgrave Macmillan, 2016, http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb3049968.
Giovannucci, Daniele, and Stefano Ponte. ‘Standards as a New Form of Social Contract? Sustainability Initiatives in the Coffee Industry’. Food Policy, vol. 30, no. 3, June 2005, pp. 284–301, https://doi.org/10.1016/j.foodpol.2005.05.007.
Haefliger, Stefan, et al. ‘Social Software and Strategy’. Long Range Planning, vol. 44, no. 5–6, 2011, pp. 297–316, https://doi.org/10.1016/j.lrp.2011.08.001.
Hatum, Andres. The New Workforce Challenge: How Today’s Leading Companies Are Adapting for the Future. electronic resource, Palgrave Macmillan, 2013, http://0-www.palgraveconnect.com.pugwash.lib.warwick.ac.uk/doifinder/10.1057/9781137302991.
Hautz, Julia, et al. ‘Open Strategy: Dimensions, Dilemmas, Dynamics’. Long Range Planning, vol. 50, no. 3, 2017, pp. 298–309, https://doi.org/10.1016/j.lrp.2016.12.001.
Holmqvist, Berit, et al., editors. Signs of Work: Semiosis and Information Processing in Organisations. Walter de Gruyter, 1996, http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb3298203.
Hu, Qing, et al. ‘Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture*’. Decision Sciences, vol. 43, no. 4, 2012, pp. 615–60, https://doi.org/10.1111/j.1540-5915.2012.00361.x.
Huang, Jimmy, João Baptista, and Sue Newell. ‘Communicational Ambidexterity as a New Capability to Manage Social Media Communication within Organizations’. The Journal of Strategic Information Systems, vol. 24, no. 2, 2015, pp. 49–64, https://doi.org/10.1016/j.jsis.2015.03.002.
Huang, Jimmy, João Baptista, and Robert D. Galliers. ‘Reconceptualizing Rhetorical Practices in Organizations: The Impact of Social Media on Internal Communications’. Information & Management, vol. 50, no. 2–3, Mar. 2013, pp. 112–24, https://doi.org/10.1016/j.im.2012.11.003.
Jacoby, Grant A. and Luqi. ‘Intranet Model and Metrics’. Communications of the ACM, vol. 50, no. 2, 2007, pp. 43–50, https://doi.org/10.1145/1216016.1216019.
Jacqueline Vischer. ‘Strategic Work-Space Planning’. Sloan Management Review, vol. 37, no. 1, 1995, http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/224968966/1FAD2B635774924PQ/8?accountid=14888.
JARVENPAA, SIRKKA L., and HUSEYIN TANRIVERDI. ‘Leading Virtual Knowledge Networks’. Organizational Dynamics, vol. 31, no. 4, Jan. 2003, pp. 403–12, https://doi.org/10.1016/S0090-2616(02)00127-4.
João Baptista (John). ‘Institutionalisation as a Process of Interplay between Technology and Its Organisational Context of Use’. Journal of Information Technology, Suppl. Special Issue on Institutional Theory in Information, vol. 24, no. 4, 2009, pp. 305–19, http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/216214069/89BA7B10EA424259PQ/3?accountid=14888.
Kaplan, Andreas M., and Michael Haenlein. ‘Users of the World, Unite! The Challenges and Opportunities of Social Media’. Business Horizons, vol. 53, no. 1, 2010, pp. 59–68, https://doi.org/10.1016/j.bushor.2009.09.003.
Kappos, Antonio, and Suzanne Rivard. ‘A Three-Perspective Model of Culture, Information Systems, and Their Development and Use.’ MIS Quarterly, vol. 32, no. 3, 2008, pp. 601–34, http://0-search.ebscohost.com.pugwash.lib.warwick.ac.uk/login.aspx?direct=true&db=bth&AN=33436507&site=bsi-live.
Karyda, Maria, et al. ‘Information Systems Security Policies: A Contextual Perspective’. Computers & Security, vol. 24, no. 3, May 2005, pp. 246–60, https://doi.org/10.1016/j.cose.2004.08.011.
Kayworth, Tim, and Dwayne Whitten. ‘Effective Information Security Requires a Balance of Social and Technology Factors’. MIS Quarterly Executive, vol. 9, no. 3, 2010, pp. 163–75, http://0-search.ebscohost.com.pugwash.lib.warwick.ac.uk/login.aspx?direct=true&db=bth&AN=53382596&site=bsi-live.
Kietzmann, Jan H., et al. ‘Social Media? Get Serious! Understanding the Functional Building Blocks of Social Media’. Business Horizons, vol. 54, no. 3, May 2011, pp. 241–51, https://doi.org/10.1016/j.bushor.2011.01.005.
Kitchin, Robert. ‘Towards Geographies of Cyberspace’. Progress in Human Geography, vol. 22, no. 3, 1998, pp. 385–406, https://doi.org/10.1191/030913298668331585.
Knapp, Kenneth, et al. ‘Information Security Policy: An Organizational-Level Process Model’. Computers & Security, vol. 28, no. 7, 2009, pp. 493–508, https://doi.org/10.1016/j.cose.2009.07.001.
Kolb, Darl. ‘Exploring the Metaphor of Connectivity: Attributes, Dimensions and Duality’. Organization Studies, vol. 29, no. 1, 2008, pp. 127–44, https://doi.org/10.1177/0170840607084574.
---. ‘States of Connectivity: New Questions and New Directions’. Organization Studies, vol. 33, no. 2, 2012, pp. 267–73, https://doi.org/10.1177/0170840611431653.
Kolkowska, Ella, and Gurpreet Dhillon. ‘Organizational Power and Information Security Rule Compliance’. Computers & Security, vol. 33, Mar. 2013, pp. 3–11, https://doi.org/10.1016/j.cose.2012.07.001.
Kossek, Ellen, et al. ‘Telecommuting, Control, and Boundary Management: Correlates of Policy Use and Practice, Job Control, and Work–Family Effectiveness’. Journal of Vocational Behavior, vol. 68, no. 2, 2006, pp. 347–67, https://doi.org/10.1016/j.jvb.2005.07.002.
Lai, Vincent S. ‘Intraorganizational Communication with Intranets’. Communications of the ACM, vol. 44, no. 7, 2001, pp. 95–100, https://doi.org/10.1145/379300.379324.
Lai, Yi, and Brendan Burchell. ‘Distributed Work: Communication in an “Officeless Firm”’. New Technology, Work and Employment, vol. 23, no. 1–2, 2008, pp. 61–76, https://doi.org/10.1111/j.1468-005X.2008.00203.x.
Leonardi, Paul M., et al. ‘Enterprise Social Media: Definition, History, and Prospects for the Study of Social Technologies in Organizations’. Journal of Computer-Mediated Communication, vol. 19, no. 1, 2013, pp. 1–19, https://doi.org/10.1111/jcc4.12029.
Mackenzie, Maureen. ‘Manager Communication and Workplace Trust: Understanding Manager and Employee Perceptions in the e-World’. International Journal of Information Management, vol. 30, no. 6, 2010, pp. 529–41, https://doi.org/10.1016/j.ijinfomgt.2010.04.001.
Maitland, Alison, and Peter Thomson. Future Work: How Businesses Can Adapt and Thrive in the New World of Work. Palgrave Macmillan, 2011, http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb2537477.
Majchrzak, A., and A. Malhotra. ‘Towards an Information Systems Perspective and Research Agenda on Crowdsourcing for Innovation’. The Journal of Strategic Information Systems, vol. 22, no. 4, 2013, pp. 257–68, https://doi.org/10.1016/j.jsis.2013.07.004.
Martini, Antonella, et al. ‘An Empirical Roadmap for Intranet Evolution’. International Journal of Information Management, vol. 29, no. 4, Aug. 2009, pp. 295–308, https://doi.org/10.1016/j.ijinfomgt.2008.10.001.
Mazmanian, Melissa, et al. ‘The Autonomy Paradox: The Implications of Mobile Email Devices for Knowledge Professionals’. Organization Science, vol. 24, no. 5, 2013, pp. 1337–57, https://doi.org/10.1287/orsc.1120.0806.
Mennie, Phil. Social Media Risk and Governance: Managing Enterprise Risk. 1st Edition, Kogan Page, 2015, http://lib.myilibrary.com/browse/open.asp?id=837922&entityid=https://idp.warwick.ac.uk/idp/shibboleth.
---. Social Media Risk and Governance: Managing Enterprise Risk. KoganPage, 2015, http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb2866389.
Mohajerani, Ali, et al. ‘Exploring the Role of Social Media in Importing Logics across Social Contexts: The Case of IT SMEs in Iran’. Technological Forecasting and Social Change, vol. 95, 2015, pp. 16–31, https://doi.org/10.1016/j.techfore.2014.06.008.
Murgolo-Poore, Marie, et al. ‘Intranet Effectiveness: A Public Relations Paper-and-Pencil Checklist’. Public Relations Review, vol. 28, no. 1, Feb. 2002, pp. 113–23, https://doi.org/10.1016/S0363-8111(02)00114-5.
Newell, Sue, et al. ‘From Global Knowledge Management to Internal Electronic Fences: Contradictory Outcomes of Intranet Development.’ British Journal of Management, vol. 12, no. 2, 2001, pp. 97–111, https://doi.org/10.1111/1467-8551.00188.
Nosworthy, Julie. ‘Implementing Information Security In The 21st Century — Do You Have the Balancing Factors?’ Computers & Security, vol. 19, no. 4, Apr. 2000, pp. 337–47, https://doi.org/10.1016/S0167-4048(00)04021-9.
Orlikowski, W. J. ‘Sociomaterial Practices: Exploring Technology at Work’. Organization Studies, vol. 28, no. 9, 2007, pp. 1435–48, https://doi.org/10.1177/0170840607081138.
R Phelps, M Mok. ‘Managing the Risks of Intranet Implementation: An Empirical Study of User Satisfaction’. Journal of Information Technology, vol. 14, no. 1, 1999, pp. 39–52, http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/216214002/13B932C547B54C7DPQ/3?accountid=14888.
Rice, Ronald, et al. ‘Organizational Media Affordances: Operationalization and Associations with Media Use’. Journal of Communication, vol. 67, no. 1, 2017, pp. 106–30, https://doi.org/10.1111/jcom.12273.
Richard Baskerville, Mikko Siponen. ‘An Information Security Meta-Policy for Emergent Organizations’. Logistics Information Management, vol. 15, no. 5, 2002, pp. 337–46, http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/220030046/FAF05147A38D4ED2PQ/4?accountid=14888.
Roberta Lamb, Elizabeth Davidson. ‘Understanding Intranets in the Context of End-User Computing’. Database for Advances in Information Systems, vol. 36, no. 1, pp. 64–85, http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/196635756/F1434F4CF4BD4CECPQ/8?accountid=14888.
Scheepers, Rens. ‘Key Roles in Intranet Implementation: The Conquest and the Aftermath.’ Journal of Information Technology, vol. 18, no. 2, 2003, pp. 103–19, https://doi.org/10.1080/0268396032000101162.
Siponen, Mikko T. ‘A Conceptual Foundation for Organizational Information Security Awareness’. Information Management & Computer Security, vol. 8, no. 1, 2000, pp. 31–41, https://doi.org/10.1108/09685220010371394.
Smithson, Steve. ‘Analysing Information Systems Evaluation: Another Look at an Old Problem’. European Journal of Information Systems; Basingstoke, vol. 7, no. 3, 1998, pp. 158–74, https://0-www-tandfonline-com.pugwash.lib.warwick.ac.uk/doi/abs/10.1057/palgrave.ejis.3000304.
Sotirios Paroutis, Alya Al Saleh. ‘Determinants of Knowledge Sharing Using Web 2.0 Technologies’. Journal of Knowledge Management, vol. 13, no. 4, 2009, pp. 52–63, http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/230323798/DF80BE80A9524E22PQ/4?accountid=14888.
Stieger, Daniel, et al. ‘Democratizing Strategy: How Crowdsourcing Can Be Used for Strategy Dialogues’. California Management Review, vol. 54, no. 4, 2012, pp. 44–68, https://doi.org/10.1525/cmr.2012.54.4.44.
Symon, Gillian, and Katrina Pritchard. ‘Performing the Responsive and Committed Employee through the Sociomaterial Mangle of Connection’. Organization Studies, vol. 36, no. 2, 2015, pp. 241–63, https://doi.org/10.1177/0170840614556914.
Tavakoli, Asin, et al. ‘Open Strategy: Literature Review, Re-Analysis of Cases and Conceptualisation as a Practice’. The Journal of Strategic Information Systems, Feb. 2017, https://doi.org/10.1016/j.jsis.2017.01.003.
Thomson, M. E., and R. von Solms. ‘Information Security Awareness: Educating Your Users Effectively’. Information Management & Computer Security, vol. 6, no. 4, 1998, pp. 167–73, https://doi.org/10.1108/09685229810227649.
Townsend, A. M., et al. ‘Virtual Teams: Technology and the Workplace of the Future.’ Academy of Management Perspectives, vol. 12, no. 3, 1998, pp. 17–29, https://doi.org/10.5465/AME.1998.1109047.
Treem, Jeffrey, and Paul Leonardi. ‘Social Media Use in Organizations: Exploring the Affordances of Visibility, Editability, Persistence, and Association’. SSRN Electronic Journal, 2012, https://ssrn.com/abstract=2129853.
Turkle, Sherry. Alone Together: Why We Expect More from Technology and Less from Each Other. Third edition, Basic Books.
---. Reclaiming Conversation: The Power of Talk in a Digital Age. Penguin Books, 2016, http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb3451851.
Vaast, Emmanuelle, and Evgeny Kaganer. ‘Social Media Affordances and Governance in the Workplace: An Examination of Organizational Policies’. Journal of Computer-Mediated Communication, vol. 19, no. 1, 2013, pp. 78–101, https://doi.org/10.1111/jcc4.12032.
Vasilis Serafeimidis, Steve Smithson. ‘Information Systems Evaluation in Practice: A Case Study of Organizational Change’. Journal of Information Technology, vol. 15, no. 2, 2000, pp. 93–105, http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/216207257/D85B1888CF824254PQ/2?accountid=14888.
Vodanovich, Shahper, et al. ‘Digital Natives and Ubiquitous Information Systems’. Information Systems Research, vol. 21, no. 4, 2010, pp. 711–23, https://doi.org/10.1287/isre.1100.0324.
von Krogh, Georg. ‘How Does Social Software Change Knowledge Management? Toward a Strategic Research Agenda’. The Journal of Strategic Information Systems, vol. 21, no. 2, June 2012, pp. 154–64, https://doi.org/10.1016/j.jsis.2012.04.003.
von Solms, Rossouw. ‘Information Security Management (1): Why Information Security Is so Important’. Information Management & Computer Security, vol. 6, no. 4, 1998, pp. 174–77, https://doi.org/10.1108/EUM0000000004533.
Wajcman, Judy, et al. ‘Families without Borders: Mobile Phones, Connectedness and Work-Home Divisions’. Sociology, vol. 42, no. 4, Aug. 2008, pp. 635–52, https://doi.org/10.1177/0038038508091620.
Wajcman, Judy, and Emily Rose. ‘Constant Connectivity: Rethinking Interruptions at Work’. Organization Studies, vol. 32, no. 7, 2011, pp. 941–61, https://doi.org/10.1177/0170840611410829.
Wanda Orlikowski. ‘The Duality of Technology: Rethinking the Concept of Technology in Organizations’. Organization Science, vol. 3, no. 3, 1992, pp. 398–427, http://0-www.jstor.org.pugwash.lib.warwick.ac.uk/stable/2635280?seq=1#page_scan_tab_contents.
Watson, Mary Anne, and Gabrielle R. Lopiano. ‘Should We Fire Him for That Post?’ Harvard Business Review, vol. 94, no. 3, 2016, pp. 103–07, http://0-search.ebscohost.com.pugwash.lib.warwick.ac.uk/direct.asp?db=bth&jid=HBR&scope=site.
White, Martin. The Intranet Management Handbook. Information Today, 2011, http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb3182495.
Whittington, Richard, et al. ‘Opening Strategy: Evolution of a Precarious Profession’. British Journal of Management, vol. 22, no. 3, 2011, pp. 531–44, https://doi.org/10.1111/j.1467-8551.2011.00762.x.
Yi, Chŏng-u, editor. The Impact of ICT on Work. Springer, 2016, http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb3016199.
Zammuto, Raymond, et al. ‘Information Technology and the Changing Fabric of Organization.’ Organization Science, vol. 18, no. 5, 2007, pp. 749–62, http://0-search.ebscohost.com.pugwash.lib.warwick.ac.uk/login.aspx?direct=true&db=bth&AN=27156594&site=bsi-live.